The Security Role - Audit Report enables organizations to monitor changes made to security roles. Organizations can retrieve information related to which users have been assigned to which security roles and the security role modification history. This report includes changes to the security role name, the parent security role, the security role type, active status, the permissions included in the security role, and users assigned to or removed from the security role.
This report supports 100,000 rows of data.
To access the Security Role - Audit Report, go to. From the System tab, select the link.
|PERMISSION NAME||PERMISSION DESCRIPTION||CATEGORY|
|Security Role - Audit Report||Grants access to the Security Role - Audit Report, which enables organizations to report on which users have been assigned to which security roles and the security role modification history. This permission cannot be constrained.||Reports - System|
The following report filters are available:
|Action Date||Select a date range for the report. The report will return any modification history for the selected date range. The default value is Last Month. This is a required field. Date values are set in the time zone of the user running the report.|
Select one security roles to include in the report. The report will return any modification history related to the selected security role.
The Security Role filter is visible to all users. However, a Restricted Access error message is displayed if an administrator attempts to use the filter or process the report if they do not have the Security Administration - Manage permission. Further, administrators can only view security roles that are within their Security Administration - Manage and Security Administration - General Constraints permissions.
|Role Status||Select this option to include inactive security roles in the report output.|
The following details are included in the report output:
- The Security Role pop-up will show only the roles that a user is part of AND the child roles of those roles.
- If a user creates a dynamic rule to assign a security role, then that rule creator will appear as the actor for any subsequent dynamic assignments of the role even if the rule creator is made inactive in the system.